• Home
  • News
    • Global Operations
      • Asia
      • Africa
      • Europe
      • Latin America
      • Middle East
      • North America
    • Industry
      • Asia
      • Africa
      • Europe
      • Latin America
      • Middle East
      • North America
      • Oceana
    • Special Interest
      • Asia
      • Africa
      • Europe
      • Latin America
      • Middle East
      • North America
      • Oceana
  • Market
    • Coming Soon
  • Intelligence
    • Job Board
    • Events
    • Contract Awards
    • USMC Deception Manual
  • Resources
    • Contact Us
    • About Us
    • Editorial Policy
    • Privacy Policy
  • Home
  • News
    • Global Operations
      • Asia
      • Africa
      • Europe
      • Latin America
      • Middle East
      • North America
    • Industry
      • Asia
      • Africa
      • Europe
      • Latin America
      • Middle East
      • North America
      • Oceana
    • Special Interest
      • Asia
      • Africa
      • Europe
      • Latin America
      • Middle East
      • North America
      • Oceana
  • Market
    • Coming Soon
  • Intelligence
    • Job Board
    • Events
    • Contract Awards
    • USMC Deception Manual
  • Resources
    • Contact Us
    • About Us
    • Editorial Policy
    • Privacy Policy
Login
Join Free
Home
Asia
Africa
Europe
Latin America
Middle East
North America
Asia
Africa
Europe
Latin America
Middle East
North America
Asia
Africa
Europe
Latin America
Middle East
North America
Coming Soon
Job Board
Events
Contact Awards
USMC Deception Manual
Login
Join Free
Home Special Interest North America Special Interest

NSA Warns of Chinese Cyber Threat to U.S. Critical Infrastructure

  • Editor Staff
  • June 4, 2024
Air Force Gen. Timothy Haugh, Commander of U.S. Cyber Command and Director of National Security Agency, gives his opening remarks for the U.S. Cyber Command Legal Conference at Joint Base Andrews (Photo by Skyler Wilson)
Share on FacebookShare on TwitterLinkedIn

China’s cyber operatives have infiltrated computer networks controlling critical U.S. infrastructure, preparing for potential future disruptions, according to the National Security Agency (NSA) director. Air Force Gen. Timothy Haugh, who also leads U.S. Cyber Command, revealed that Chinese hackers have been positioning cyber tools in ways that suggest preparations for large-scale sabotage rather than intelligence gathering.

Gen. Haugh expressed concerns over these activities, noting their unique military nature. “We see attempts to be latent in a network that is critical infrastructure, that has no intelligence value, which is why it is so concerning,” he told The Wall Street Journal. The primary threat stems from China’s “Volt Typhoon” cyber targeting program, which has infiltrated systems controlling water and other critical infrastructure on Guam, a key U.S. military hub in the Pacific.

The NSA and Microsoft exposed the Volt Typhoon intrusion program in May 2023, identifying sectors such as communications, transportation, and maritime as targets. The infiltration continues, posing ongoing risks. These developments come amid rising tensions between the U.S. and China over issues like Taiwan and territorial disputes in the South and East China Seas.

Gen. Haugh noted that cyberattacks could be a precursor to broader conflicts, targeting U.S. networks operating essential services like electric power, transportation, and water systems. “Sabotaging those networks would cause massive disruptions and potentially a large-scale loss of lives,” he warned, emphasizing the particular threat to civilian water supplies.

China’s People’s Liberation Army (PLA) employs a strategy known as “unrestricted warfare,” which advocates for using all forms of warfare to secure victory. This approach is evident in the PLA’s cyber activities, which include targeting U.S. military networks. Gen. Haugh indicated that the U.S. military remains vigilant against such threats, expecting further areas of penetration by Beijing to be uncovered.

Increased public awareness of these threats is a strategic move by the U.S. government. Gen. Haugh emphasized the need to “make the tradecraft widely known” to counteract the intrusions effectively. Unlike cyber operations designed to steal data, which are more easily tracked, the infrastructure intrusions by Volt Typhoon hackers are harder to detect. These hackers use a method called “living off the land,” where they gain access to a network by masquerading as authorized users and use the system’s own tools to prepare for sabotage.

High-level U.S. officials, including FBI Director Christopher Wray and Energy Secretary Jennifer Granholm, have underscored the severity of the threat. In Senate testimony, Secretary Granholm and Jill Hruby, director of the National Nuclear Security Administration, highlighted Volt Typhoon’s access to critical energy infrastructure as a significant alarm.

 

Expanded Coverage:

Mint

Washington Times

The Straits Times

JOIN THE SOFX REPORT

Read the daily 5-minute intel report built to inform over 36,000 decision makers across the Special Operations and Defense Community.

    Your privacy is our priority. We will never rent, sell or share your information with anyone.

    Editor Staff

    Editor Staff

    The Editor Staff at SOFX comprises a diverse, global team of dedicated staff writers and skilled freelancers. Together, they form the backbone of our reporting and content creation.

    Subscribe
    Login
    Notify of
    Please login to comment
    0 Comments
    Oldest
    Newest Most Voted
    Inline Feedbacks
    View all comments
    ADVERTISEMENT

    Trending News

    Third F/A-18 Jet Lost from USS Truman During Red Sea Operations

    Third F/A-18 Jet Lost from USS Truman During Red Sea Operations

    by Editor Staff
    May 8, 2025
    0

    The USS Harry S. Truman lost another F/A-18F Super Hornet fighter jet on Tuesday when it went overboard during a...

    Bodycam Footage Captures Ukrainian Special Ops Wiping Out Russian Unit in Covert Mission

    Bodycam Footage Captures Ukrainian Special Ops Wiping Out Russian Unit in Covert Mission

    by Editor Staff
    May 13, 2025
    0

    Newly released footage from Ukraine’s Special Operations Forces (SSO) shows a Ukrainian unit eliminating an eight-man Russian assault group during...

    Video Shows Close-Combat Clash Between IDF and Hamas in Gaza

    Video Shows Close-Combat Clash Between IDF and Hamas in Gaza

    by Editor Staff
    May 12, 2025
    0

    A video reportedly released by Israeli local Israeli media outlets shows Israeli Defense Forces (IDF) soldiers in a close-range firefight...

    ADVERTISEMENT
    ADVERTISEMENT
    Next Post
    DOJ Prosecutes Chinese National for Espionage Involving Drone and U.S. Military Installations

    DOJ Prosecutes Chinese National for Espionage Involving Drone and U.S. Military Installations

    Israeli Military Confirms Deaths of Four Hostages Held by Hamas

    Israeli Military Confirms Deaths of Four Hostages Held by Hamas

    997 Morrison Dr. Suite 200, Charleston, SC 29403

    News

    • Global Operations
    • Special Interest
    • Industry
    • Global Operations
    • Special Interest
    • Industry

    Services

    • Membership Page
    • Merchandise
    • Recruiting
    • Membership Page
    • Merchandise
    • Recruiting

    Resources

    • About Us
    • Contact Us
    • Editorial Policy
    • Privacy Policy
    • About Us
    • Contact Us
    • Editorial Policy
    • Privacy Policy
    wpDiscuz
    No Result
    View All Result
    • Home
    • News
      • Global Operations
        • Asia
        • Africa
        • Europe
        • Latin America
        • Middle East
        • North America
      • Industry
        • Asia
        • Africa
        • Europe
        • Latin America
        • Middle East
        • North America
        • Oceana
      • Special Interest
        • Asia
        • Africa
        • Europe
        • Latin America
        • Middle East
        • North America
        • Oceana
    • Market
      • Coming Soon
    • Intelligence
      • Job Board
      • Events
      • Contract Awards
      • USMC Deception Manual
    • Resources
      • Contact Us
      • About Us
      • Editorial Policy
      • Privacy Policy
    Subscribe
    This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.